I wonder if this will mean more and more servers are going to be sued. I've been playing on private servers since 2012, I play hours each day, and the future does not look very bright if this keeps happening I'm afraid...
Just two days ago I started my journey as a blood elf hunter :-)
The problem with private servers is that they seem to be addicted to OVH. I get it that it's cheap, has nice routes and usually they don't give a damn about what you host, but it's a single point of failure. I wonder if many of those servers are about to move to Ukraine (Russia) or something like that :-)
Ah, and believe me, some of them make ludicrous amounts of money, have paid employees, etc. It's not just a community. They all forked MaNGOS or TrinityCore and starting piling up their fixes on top of it (which they don't have to share because it's GPL, not AGPL), but some chose to pay their developers!
I'm happy to answer any questions about what it's like to play on private servers or how some stuff works in the technical side, or the community, or whatever!
How much administrative effort does it take to operate a private server? I've always kind of conceptualized it as a duct-tape-and-baling-wire affair, but I have a sneaking suspicion things are a lot more professional these days.
Ah, the Twitter app for Android (beta version) recently added a feature that allows you to add a description to pictures you upload for impaired people.
I'm not sure, but I think WhatsApp stores your key and it sends it to your mobile so you can decrypt the backup you downloaded from Google. But you can disable backups...
And why not? A project is a project, and some twat who happens to have the keys to the Twitter account of that project should not define how you should feel about a community.
Requires purchase of a cerficate from one of the authorities Microsoft recognises (Verisign/Digicert/...) and then the signature of Microsoft on compiled bootloader code. Either way, you have to pay and you have to get Microsoft's permission.
It certainly does not require FOSS users to purchase a license. There is already a shim loader signed by a MS-recognized authority, which ships with a signed copy of MokManager, which lets you register a "machine owner key" of your own choosing. You can then use that key to sign kernels for your own machine, or for anyone else who wants to go through the on-screen enrollment step to trust your key.
No additional money has to change hands between anyone, and no additional permission needs to be granted from Microsoft to anyone. (You have to get the permission of someone with physical access to the machine during boot, but if your goal here was FOSS users controlling their own computing, it's a good thing that that permission is required.)
IFF you want to support the default set of keys installed on computers that ship with Windows. Secure Boot does not prevent you from installing your own keys, in fact most linux distributions do this already and just use a shim loader signed by Microsoft, the rest of the chain is signed by custom keys (the keys are silently and automatically installed for you).
IIRC, Secure Boot spec said there must be multiple trust anchors, i.e. it's not like "user's own or Microsoft", but there can be any combination of trusted CAs (and I bet there's NSAKEY somewhere, huh).
I'm not sure about the implementations and real-world situation, but as far as I get it, with X.509 with Secure Boot generally uses, one should be able put the exact card's vendor certificate (not MS CA root one) to trust the extension card. (Sadly, I think there's no way to trust one specific signature.) I guess that's probably very non-trivial in practice.
At worst, one should be able to put their own CA (to sign their own software) and be forced to add MS CA to trust the third-party software as well. But - if UEFI implementation allows user-defined CAs - it should be possible to run your own code without asking Microsoft's permission.
To be fair, I think this is only for tablet & mobile.
On desktops and laptops I've seen, there was a way for end-user to upload their own trusted certificates and use those instead of Microsoft ones, and I think that's when done like this (when, whatever the defaults are, end-user can get in control), Secure Boot is a good idea - even though the implementations are not.
I guess there must be some ignorant (or malicious) desktop/laptop vendors that don't provide key management options, but hope there isn't many.
???